US20080172257A1 - Health Insurance Fraud Detection Using Social Network Analytics - Google Patents
Health Insurance Fraud Detection Using Social Network Analytics Download PDFInfo
- Publication number
- US20080172257A1 US20080172257A1 US11/622,740 US62274007A US2008172257A1 US 20080172257 A1 US20080172257 A1 US 20080172257A1 US 62274007 A US62274007 A US 62274007A US 2008172257 A1 US2008172257 A1 US 2008172257A1
- Authority
- US
- United States
- Prior art keywords
- social network
- physicians
- care providers
- health care
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/08—Insurance
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16H—HEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
- G16H80/00—ICT specially adapted for facilitating communication between medical practitioners or patients, e.g. for collaborative diagnosis, therapy or health monitoring
Definitions
- the present application generally relates to combating healthcare provider fraud and abuse and, more particularly, to mining social relationships and analyzing their patterns based on network data structures in order to detect fraud, abuse and waste on private health insurers, government-funded health plans and consumers.
- the invention takes social relationships into account, specifically triangulation of incomplete information and paths beyond direct connections.
- the problem of healthcare fraud detection is solved by mining social relationships and analyzing their patterns based on network data structures as well as correlation in node attributes and correlation in who is known by whom. More particularly, the invention constructs social networks depicting referral patterns (from health insurance claim information) and associations (from publicly available connection data) to analyze referral patterns and detect possible fraud, abuse and unnecessary overuse.
- the fraud and abuse management system supports the various aspects of fraud investigation and management, including prevention, investigation, detection and settlement. Using a unique combination of data mining capabilities and graphical reporting tools, the system can identify potentially fraudulent and abusive behavior before a claim is paid or, retrospectively, analyze providers' past behaviors to flag suspicious patterns. In either case, the fraud and abuse management system operates more swiftly and effectively than traditional manual processes—sorting through tens of thousands of providers and tens of millions of claims in minutes, and then ranking providers as to their degree of potentially abusive behavior.
- the fraud and abuse management system helps speed and extend the ability to recover mistakenly paid claims, but the system also promotes compliance by providers and claimants, who quickly realize that fraud detection and enforcement have become more systematic and effective—an outcome known as the “sentinel effect”. Additionally, by automating processes previously conducted manually and by more accurately targeting likely offenders, the system helps enable investigators and auditors to become more productive, handling broader caseloads and conducing a higher proportion of successful investigations. In fact, many healthcare payers realize a significant return on investment within a relative short time after implementation.
- FIG. 1 is a diagrammatic illustration of a social network of physicians
- FIG. 4 is a flowchart illustrating the logic of the process of populating a mathematical decision-making model based on the attributes to perform social network analysis implemented by the system of FIG. 2 ;
- FIG. 5 is a flow diagram illustrating the logic of the fraud and abuse management system according to the invention.
- Social networking also refers to a category of Internet applications to help connect friends, business partners, or other individuals together using a variety of tools. These applications, known as online social networks are becoming increasingly popular.
- a social network is a map of all of the relevant linkages between the nodes being studied.
- the network can also be used to determine the social capital of individual actors.
- the shape of the social network helps determine a network's usefulness to its individuals. Smaller, tighter networks can be less useful to their members than networks with lots of loose connections (weak ties) to individuals outside the main network. More “open” networks, with many weak ties and social connections, are more likely to introduce new ideas and opportunities to their members than closed networks with many redundant ties. In other words, a group of friends who only do things with each other already share the same knowledge and opportunities. A group of individuals with connections to other social worlds is likely to have access to a wider range of information. It is better for individual success to have connections to a variety of networks rather than many connections within a single network. Similarly, individuals can exercise influence or act as brokers within their social networks by bridging two networks that are not directly linked (called filling social holes).
- Power within organizations generally has been found to come more from the degree to which an individual within a network is at the center of many relationships than actual job title.
- Social networks also play a key role in hiring, in business success for firms, and in job performance.
- Social networking websites e.g., online social networks
- Online social networks have become widely used in virtual communities.
- an initial set of founders sends out messages inviting members of their own personal networks to join the site.
- New members repeat the process, growing the total number of members and links in the network.
- Sites offer features such as automatic address book updates, viewable profiles, the ability to form new links through “introduction services”, and other forms of online social connections.
- Social networks can also be organized around business connections.
- FIG. 1 there is shown a social network of physicians; however, it will be understood for purposes of this invention that the social network typically includes other health care providers as well as physicians.
- the lines between individual physicians represent “links” which are based on attributes, such as “went to the same university”, “attended same conference”, “co-authored a paper”, etc. that represent the social network
- FIG. 1 it will be observed that not all physicians in this exemplary social network are linked to other physicians or other groups of physicians.
- the other physicians represented in FIG. 1 are “Specialists”. Emanating from the “Referring Physician” are several arrowed lines terminating in individual “Specialists”. These represent links based on the referral pattern of the “Referring Physician”.
- a link of interest from the “Referring Physician” to this “Specialist” can be detected using the social network mapping, as indicated by the line 103 between the “Referring Physician” and this “Specialist”. As defined above, this link of interest could be having attended the same university or medical school, attended the same conference, co-authored papers, or other such relationship. It will be noted that there is no corresponding link between the “Referring Physician” and “Specialist” physicians 104 and 105 ; however, a link of interest 106 between physicians 104 and 105 can be detected using the social network mapping. And while there is no corresponding link between the “Referring Physician” and “Specialist” physician 107 , two alternate paths from the “Referring Physician” to this “Specialist” physician can be detected using the social network mapping.
- an exemplary system can include a social network analysis (SNA) unit 240 , which receives input from a plurality of disparate, heterogeneous data sources (e.g., 225 , 230 , 245 ).
- SNA social network analysis
- the present invention can provide automated collection (e.g., scrapping, parsing, etc.) combined with traditional user-generated (e.g., survey) methods for social network construction.
- data 230 can be derived (or automatically collected) from social computing units 205 , 210 , and 215 ).
- the social computing units 205 , 210 , and 215 can include, for example, email, instant messaging, blogs, wikis, auctions, web interactive communication or research, online social networking websites, etc.
- data 225 can be derived from user generated data 220 (e.g., traditional surveys, a plurality of user generated data sources, etc.).
- the data sources include at least one user generated data source (e.g., a survey, etc.) and at least one non-user generated data source.
- the present invention can perform social network analysis of the attendees based on survey information before the event, survey information after the event, and time delayed follow up survey information, which may include whether the participants are or have now talked or worked together. Also, secondary interactions/connections can be taken into account, such as participants connecting with others through other participants, or by word of mouth/e-mail, etc.
- the present invention can construct a social network from a plurality of disparate, heterogeneous data sources, such as survey data (e.g., a plurality of user generated data sources), social computing data, and combinations thereof.
- the present invention can provide attribute richness, including deterministic and probabilistic attributes, as well as capturing dynamic social network aspects (i.e., dynamic characterization of network components, that is, nodes and linkages) by extracting or obtaining data from disparate, heterogeneous data sources.
- a computer implemented method of constructing a social network includes, for example, constructing the social network from a plurality of disparate, heterogeneous data sources (e.g., see function block 310 ).
- a computer implemented method of constructing the social network includes, for example, identifying a plurality of nodes and linkages in function block 410 , and determining attributes of the nodes and linkages based on the plurality of disparate, heterogeneous data sources in function block 420 .
- the attributes can include, for example, at least one of a deterministic attribute, a probabilistic attribute, and a dynamic attribute.
- the present invention also can construct referral patterns from historical data, analyze the historical data together with social network data to detect possibly fraudulent patterns (e.g., see function block 320 ).
- the data sources include at least one user generated data source (e.g., a survey, etc.) and at least one non-user generated data source.
- social network optimization can be performed to make business decisions to use the information, for example, to identify places in social network that merit focus, to campaign in a certain way, etc.
- the present invention exemplarily can populate a mathematical decision-making model based on the attributes in function block 430 (e.g., to perform social network analysis).
- the present invention can determine attributes of the nodes and linkages from a plurality of disparate, heterogeneous data sources at another point in time (e.g., a second point in time after the first determination of attributes is made) in function block 440 .
- the mathematical decision-making model can then be re-populated based on the second set of attributes in function block 450 (e.g., SNA can be re-performed).
- SNA can be re-performed.
- This process of determining attributes at different points in time and re-populating the decision-making model can be repeated, as exemplarily illustrated in FIG. 4 (e.g., SNA can be repeated).
- FIG. 6 illustrates a typical hardware configuration of an information handling/computer system for use with the invention and which preferably has at least one processor or central processing unit (CPU) 611 .
- the CPUs 611 are interconnected via a system bus 612 to a random access memory (RAM) 614 , read-only memory (ROM) 616 , input/output (I/O) adapter 618 (for connecting peripheral devices such as disk units 621 and tape drives 640 to the bus 612 ), user interface adapter 622 (for connecting a keyboard 624 , mouse 626 , speaker 628 , microphone 632 , and/or other user interface device to the bus 612 ), a communication adapter 634 for connecting an information handling system to a data processing network, the Internet, an Intranet, a local area network (LAN), etc., and a display adapter 636 for connecting the bus 612 to a display device 638 and/or printer 639 .
- RAM random access memory
- ROM read-only memory
- I/O input/
- Such a method may be implemented, for example, by operating a computer, as embodied by a digital data processing apparatus, to execute a sequence of machine-readable instructions. These instructions may reside in various types of signal-bearing media.
- This signal-bearing media may include, for example, a RAM contained within the CPU 611 , as represented by the fast-access storage for example.
- the instructions may be contained in another signal-bearing media, such as a data storage disk/diskette, directly or indirectly accessible by the CPU 611 .
- the instructions may be stored on a variety of machine-readable data storage media, such as direct access storage device (DASD) (e.g., a conventional “hard drive” or a RAID (redundant array of individual disk drives) array), magnetic tape, electronic read-only memory (e.g., ROM, EPROM, or EEPROM), an optical storage device (e.g. CD-ROM, WORM, DVD, digital optical tape, etc.), paper “punch” cards, or other suitable signal-bearing media including transmission media such as digital and analog and communication links and wireless.
- DASD direct access storage device
- ROM read-only memory
- EPROM erasable programmable read-only memory
- EEPROM electrically erasable programmable read-only memory
- an optical storage device e.g. CD-ROM, WORM, DVD, digital optical tape, etc.
- paper “punch” cards e.g. CD-ROM, WORM, DVD, digital optical tape, etc.
- the machine-readable instructions may comprise software
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Entrepreneurship & Innovation (AREA)
- Economics (AREA)
- Marketing (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- Medical Informatics (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Human Resources & Organizations (AREA)
- Biomedical Technology (AREA)
- Data Mining & Analysis (AREA)
- Tourism & Hospitality (AREA)
- Pathology (AREA)
- Epidemiology (AREA)
- General Health & Medical Sciences (AREA)
- Primary Health Care (AREA)
- Public Health (AREA)
- Quality & Reliability (AREA)
- Operations Research (AREA)
- Development Economics (AREA)
- Technology Law (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Healthcare fraud detection is accomplished by mining social relationships and analyzing their patterns based on network data structures. Social networks are constructed which depict referral patterns (from health insurance claim information) and associations (from publicly available connection data) to analyze referral patterns and detect possible fraud, abuse and unnecessary overuse. The fraud and abuse management system supports the various aspects of fraud investigation and management, including prevention, investigation, detection and settlement. Using a unique combination of data mining capabilities and graphical reporting tools, the system can identify potentially fraudulent and abusive behavior before a claim is paid or, retrospectively, analyze providers' past behaviors to flag suspicious patterns.
Description
- 1. Field of the Invention
- The present application generally relates to combating healthcare provider fraud and abuse and, more particularly, to mining social relationships and analyzing their patterns based on network data structures in order to detect fraud, abuse and waste on private health insurers, government-funded health plans and consumers. The invention takes social relationships into account, specifically triangulation of incomplete information and paths beyond direct connections.
- 2. Background Description
- According to estimates from the federal government, and from issues-based groups such as the National Health Care Anti-Fraud Association (NHCAA), as much as ten percent of all healthcare expenditures in the United States may be lost each year to fraud, abuse and waste. That translates to more than US$200 billion—coming largely from healthcare providers attempting to defraud the system. Methods of cheating, such as billing for more expensive services than those actually performed or even conducting medically unnecessary procedures for the purpose of billing insurance, have become more sophisticated and more costly to payers. For example, the NHCAA reported that one Texas chiropractor was caught submitting US$5.7 million in fraudulent claims over a five-year period.
- Detecting fraudulent activity is not easy. Given the huge volume of data involved, resource and process limitations have forced many healthcare payers to rely on “pay-and-chase” strategies, in which claims are paid and then later—sometimes years later—investigated for fraud. However, such after-the-fact collections are almost never paid in full. Known solutions to this problem do not take key social network metrics and concepts into account, specifically triangulation of incomplete information and paths beyond direct connections.
- It is therefore an object of this invention to provide a sophisticated, comprehensive fraud and abuse management solution with both proactive and retrospective detection capabilities that helps healthcare payers identify and pursue fraud cases faster and more cost effectively.
- According to the present invention, the problem of healthcare fraud detection is solved by mining social relationships and analyzing their patterns based on network data structures as well as correlation in node attributes and correlation in who is known by whom. More particularly, the invention constructs social networks depicting referral patterns (from health insurance claim information) and associations (from publicly available connection data) to analyze referral patterns and detect possible fraud, abuse and unnecessary overuse.
- The fraud and abuse management system according to the invention supports the various aspects of fraud investigation and management, including prevention, investigation, detection and settlement. Using a unique combination of data mining capabilities and graphical reporting tools, the system can identify potentially fraudulent and abusive behavior before a claim is paid or, retrospectively, analyze providers' past behaviors to flag suspicious patterns. In either case, the fraud and abuse management system operates more swiftly and effectively than traditional manual processes—sorting through tens of thousands of providers and tens of millions of claims in minutes, and then ranking providers as to their degree of potentially abusive behavior.
- With the ability to drill down into detailed information on each provider or claim, anti-fraud investigators and auditors can zero in on questionable behavior, avoiding dead ends and focusing on the most egregious offenders. A “point-and-click” graphical interface, a reports and database wizard and extensive help documentation make the system relatively easy to learn and simple to use.
- Not only does the fraud and abuse management system according to the invention help speed and extend the ability to recover mistakenly paid claims, but the system also promotes compliance by providers and claimants, who quickly realize that fraud detection and enforcement have become more systematic and effective—an outcome known as the “sentinel effect”. Additionally, by automating processes previously conducted manually and by more accurately targeting likely offenders, the system helps enable investigators and auditors to become more productive, handling broader caseloads and conducing a higher proportion of successful investigations. In fact, many healthcare payers realize a significant return on investment within a relative short time after implementation.
- The foregoing and other objects, aspects and advantages will be better understood from the following detailed description of a preferred embodiment of the invention with reference to the drawings, in which:
-
FIG. 1 is a diagrammatic illustration of a social network of physicians; -
FIG. 2 is a block diagram of a system implementing the concepts of social network computing, analysis and optimization according to the present invention; -
FIG. 3 is a flowchart illustrating the logic of the process of constructing a social network and performing social network optimization implemented by the system shown inFIG. 2 ; -
FIG. 4 is a flowchart illustrating the logic of the process of populating a mathematical decision-making model based on the attributes to perform social network analysis implemented by the system ofFIG. 2 ; -
FIG. 5 is a flow diagram illustrating the logic of the fraud and abuse management system according to the invention; and -
FIG. 6 is a block diagram of an exemplary hardware/information handing system on which the present invention may be practiced. - The following definitions are provided for terms used in describing the invention:
- Social Network—A social structure where nodes are individuals or organizations and edges or links represent their relationships, communications, influence, and the like.
- Social Computing—Refers to the use of social software, such as e-mail, information management, web logs (blogs), wikis1, auctions, and the like. 1 “Wiki” is defined in the wiki.org Web site as “a piece of sever software that allows users to freely create and edit Web page content using any Web browser.”
- Social Network Analysis (SNA)—A set of methods and metrics that shows how people collaborate, patterns of communication, information-sharing, potential influence and decision-making.
- Research in a number of academic fields has demonstrated that social networks operate on many levels, from families up to the level of nations, and play a critical role in determining the way problems are solved, organizations are run, information is shared, and the degree to which individuals succeed in achieving their goals.
- Social networking also refers to a category of Internet applications to help connect friends, business partners, or other individuals together using a variety of tools. These applications, known as online social networks are becoming increasingly popular.
- Generally, social network theory views social relationships in terms of nodes and ties (or ties). Nodes are the individual actors within the networks, and linkages are the relationships between the actors.
- There can be many kinds of linkages between the nodes. In its most simple form, a social network is a map of all of the relevant linkages between the nodes being studied. The network can also be used to determine the social capital of individual actors. These concepts are often displayed in a social network diagram, where nodes are the points and linkages are the lines.
- The shape of the social network helps determine a network's usefulness to its individuals. Smaller, tighter networks can be less useful to their members than networks with lots of loose connections (weak ties) to individuals outside the main network. More “open” networks, with many weak ties and social connections, are more likely to introduce new ideas and opportunities to their members than closed networks with many redundant ties. In other words, a group of friends who only do things with each other already share the same knowledge and opportunities. A group of individuals with connections to other social worlds is likely to have access to a wider range of information. It is better for individual success to have connections to a variety of networks rather than many connections within a single network. Similarly, individuals can exercise influence or act as brokers within their social networks by bridging two networks that are not directly linked (called filling social holes).
- The power of social network theory stems from its difference from traditional sociological studies, which assume that it is the attributes of individual actors that matter. Social network theory produces an alternate view, where the attributes of individuals are less important than their relationships and ties with other actors within the network. This approach has turned out to be useful for explaining many real-world phenomena, but leaves less room for individual agency, and the ability for individuals to influence their success, since so much of it rests within the structure of their network.
- Social networks have also been used to examine how companies interact with each other, characterizing the many informal connections that link executives together, as well as associations and connections between individual employees at different companies. These networks provide ways for companies to gather information, deter competition, and even collude in setting prices or policies.
- Power within organizations, for example, generally has been found to come more from the degree to which an individual within a network is at the center of many relationships than actual job title. Social networks also play a key role in hiring, in business success for firms, and in job performance.
- Social networking websites (e.g., online social networks) have become widely used in virtual communities. In these communities, an initial set of founders sends out messages inviting members of their own personal networks to join the site. New members repeat the process, growing the total number of members and links in the network. Sites then offer features such as automatic address book updates, viewable profiles, the ability to form new links through “introduction services”, and other forms of online social connections. Social networks can also be organized around business connections.
- The general concept of using social analytics as applied to health insurance fraud detection can be visualized in the diagram of
FIG. 1 . Referring toFIG. 1 , there is shown a social network of physicians; however, it will be understood for purposes of this invention that the social network typically includes other health care providers as well as physicians. The lines between individual physicians represent “links” which are based on attributes, such as “went to the same university”, “attended same conference”, “co-authored a paper”, etc. that represent the social network InFIG. 1 , it will be observed that not all physicians in this exemplary social network are linked to other physicians or other groups of physicians. Roughly in the center ofFIG. 1 is aphysician 101 labeled as “Referring Physician”. For the purposes of this description, the other physicians represented inFIG. 1 are “Specialists”. Emanating from the “Referring Physician” are several arrowed lines terminating in individual “Specialists”. These represent links based on the referral pattern of the “Referring Physician”. - Considering first “Specialist”
physician 102, a link of interest from the “Referring Physician” to this “Specialist” can be detected using the social network mapping, as indicated by theline 103 between the “Referring Physician” and this “Specialist”. As defined above, this link of interest could be having attended the same university or medical school, attended the same conference, co-authored papers, or other such relationship. It will be noted that there is no corresponding link between the “Referring Physician” and “Specialist”physicians interest 106 betweenphysicians physician 107, two alternate paths from the “Referring Physician” to this “Specialist” physician can be detected using the social network mapping. -
FIG. 1 illustrates the use of social network maps to introduce structure to what is otherwise “unstructured” information. Correlation between nodes may be detected among nodes that are not necessarily adjacent; i.e., have an edge between them. Social network metrics, such as geodesic (social distance) to a central character with certain attributes, are used to enhance the pattern detection. Thus, social network maps can be used to make visible patterns of referrals that are not currently easy to detect. - With reference to
FIG. 2 , an exemplary system according to the present invention can include a social network analysis (SNA)unit 240, which receives input from a plurality of disparate, heterogeneous data sources (e.g., 225, 230, 245). The present invention can provide automated collection (e.g., scrapping, parsing, etc.) combined with traditional user-generated (e.g., survey) methods for social network construction. - For example, with reference again to
FIG. 2 ,data 230 can be derived (or automatically collected) fromsocial computing units social computing units - On the other hand,
data 225 can be derived from user generated data 220 (e.g., traditional surveys, a plurality of user generated data sources, etc.). In one aspect of the invention, the data sources include at least one user generated data source (e.g., a survey, etc.) and at least one non-user generated data source. - For example, according to the exemplary aspects of the present invention, a survey can be administered to a group of participants of an event prior to the event to obtain a plurality of user generated data. Another survey can be administered after the event, and/or after a predetermined period of time has elapsed from the time of the event.
- Since some of the participants will have interacted at the event, and possibly gotten to know each other during the event, connections may have been made. As another example, some participants may have obtained ideas from participants who deal with patients, while others may derive patient diagnosis ideas from research specialists.
- The present invention can perform social network analysis of the attendees based on survey information before the event, survey information after the event, and time delayed follow up survey information, which may include whether the participants are or have now talked or worked together. Also, secondary interactions/connections can be taken into account, such as participants connecting with others through other participants, or by word of mouth/e-mail, etc.
- Those skilled in the arts of data processing would know and understand that
other data 245 also can be derived or extracted from a variety of other sources, such as directories, etc. - The present invention can construct a social network from a plurality of disparate, heterogeneous data sources, such as survey data (e.g., a plurality of user generated data sources), social computing data, and combinations thereof. Hence, the present invention can provide attribute richness, including deterministic and probabilistic attributes, as well as capturing dynamic social network aspects (i.e., dynamic characterization of network components, that is, nodes and linkages) by extracting or obtaining data from disparate, heterogeneous data sources.
- The aforementioned exemplary linkages between people can provide valuable metrics and can provide disparate, heterogeneous data to be used to compare the before and after states of the nodes and linkages of the social network and make business decisions.
- Referring again to
FIG. 2 , thedata 250 from the socialnetwork analysis unit 240 is input tounit 260 which also receives asinputs data referral data history 255. Unit 26 analyzes the combination of referral patterns and social network data and generates as its output a report of patterns to investigate forfraud 270. - An exemplary method according to the present invention is described with reference to
FIG. 3 . With reference to the exemplary method illustrated inFIG. 3 , a computer implemented method of constructing a social network includes, for example, constructing the social network from a plurality of disparate, heterogeneous data sources (e.g., see function block 310). - With reference to the exemplary method illustrated in
FIG. 4 , a computer implemented method of constructing the social network includes, for example, identifying a plurality of nodes and linkages infunction block 410, and determining attributes of the nodes and linkages based on the plurality of disparate, heterogeneous data sources in function block 420. The attributes can include, for example, at least one of a deterministic attribute, a probabilistic attribute, and a dynamic attribute. - With reference again to
FIG. 3 , the present invention also can construct referral patterns from historical data, analyze the historical data together with social network data to detect possibly fraudulent patterns (e.g., see function block 320). In one aspect of the invention, the data sources include at least one user generated data source (e.g., a survey, etc.) and at least one non-user generated data source. Thus, social network optimization can be performed to make business decisions to use the information, for example, to identify places in social network that merit focus, to campaign in a certain way, etc. - With reference again to
FIG. 4 , the present invention exemplarily can populate a mathematical decision-making model based on the attributes in function block 430 (e.g., to perform social network analysis). - The present invention can determine attributes of the nodes and linkages from a plurality of disparate, heterogeneous data sources at another point in time (e.g., a second point in time after the first determination of attributes is made) in
function block 440. The mathematical decision-making model can then be re-populated based on the second set of attributes in function block 450 (e.g., SNA can be re-performed). This process of determining attributes at different points in time and re-populating the decision-making model can be repeated, as exemplarily illustrated inFIG. 4 (e.g., SNA can be repeated). -
FIG. 5 illustrates how the invention is applied to health insurance fraud detection using social analytics. The process starts by setting parameters (i.e., the scope of the investigation) infunction block 501. These parameters are used to extract referral data infunction block 502 by accessing claim data indatabase 503. This referral data is then used infunction block 504 to find, using data mining techniques, general relationship data between referring physicians and specialists. For example, International Business Machines (IBM) Corporation's DB2 database product incorporates data mining functions which can be used in the practice of the invention. This data is extracted from public data indatabase 505. The general relationship data is used infunction block 506 to create asocial network map 507, of the type described with reference toFIG. 1 . This social network map is then analyzed infunction block 508 to find patterns, again as described with reference toFIG. 1 . On the basis of the analysis performed, an exception report is created and output inoutput block 509. This exception report lists scenarios that should be investigated. It is important to note that the analyzed patterns are used to steer insurance investigators toward claims that are more likely to be fraudulent. The analysis does not provide complete predictors of fraudulent activity; therefore, based on the exception report, investigations are performed atfunction block 510, and the results of those investigations are provided asfeedback 511 to improve pattern analysis. - The invention not only produces the ability to help locate fraud itself, but it can be used with other fraud detection methods by adding to the positive confirmation score that might be used to tie the results of several methods together.
-
FIG. 6 illustrates a typical hardware configuration of an information handling/computer system for use with the invention and which preferably has at least one processor or central processing unit (CPU) 611. TheCPUs 611 are interconnected via asystem bus 612 to a random access memory (RAM) 614, read-only memory (ROM) 616, input/output (I/O) adapter 618 (for connecting peripheral devices such asdisk units 621 and tape drives 640 to the bus 612), user interface adapter 622 (for connecting akeyboard 624,mouse 626,speaker 628,microphone 632, and/or other user interface device to the bus 612), acommunication adapter 634 for connecting an information handling system to a data processing network, the Internet, an Intranet, a local area network (LAN), etc., and adisplay adapter 636 for connecting thebus 612 to adisplay device 638 and/orprinter 639. - In addition to the hardware/software environment described above, a different aspect of the invention includes a computer-implemented method for performing the above method. As an example, this method may be implemented in the particular environment discussed above.
- Such a method may be implemented, for example, by operating a computer, as embodied by a digital data processing apparatus, to execute a sequence of machine-readable instructions. These instructions may reside in various types of signal-bearing media.
- This signal-bearing media may include, for example, a RAM contained within the
CPU 611, as represented by the fast-access storage for example. Alternatively, the instructions may be contained in another signal-bearing media, such as a data storage disk/diskette, directly or indirectly accessible by theCPU 611. - Whether contained in the disk/diskette, the computer/
CPU 611, or elsewhere, the instructions may be stored on a variety of machine-readable data storage media, such as direct access storage device (DASD) (e.g., a conventional “hard drive” or a RAID (redundant array of individual disk drives) array), magnetic tape, electronic read-only memory (e.g., ROM, EPROM, or EEPROM), an optical storage device (e.g. CD-ROM, WORM, DVD, digital optical tape, etc.), paper “punch” cards, or other suitable signal-bearing media including transmission media such as digital and analog and communication links and wireless. In an illustrative embodiment of the invention, the machine-readable instructions may comprise software object code, compiled from a language such as “C”, etc. - While the invention has been described in terms of a single preferred embodiment, those skilled in the art will recognize that the invention can be practiced with modification within the spirit and scope of the appended claims.
Claims (12)
1. A computer implemented method for health insurance fraud detection comprising the steps of:
constructing a social network database of physicians and health care providers from multiple, disparate and heterogeneous data sources;
extracting data pertaining to referrals between physicians and health care providers from a claim database; and
analyzing extracted data pertaining to referrals using data from the social network database to detect patterns that help determine scenarios for investigation.
2. The computer implemented method for health insurance fraud detection recited in claim 1 , wherein the step of constructing a social network of physicians and health care providers uses data mining techniques to find relationship data between physicians and health care providers.
3. The computer implemented method for health insurance fraud detection recited in claim 1 , wherein the step of constructing a social network of physicians and health care providers identifies physicians and health care providers as nodes with linkages in a social network, wherein the linkages are deterministic and probabilistic attributes.
4. The computer implemented method for health insurance fraud detection recited in claim 3 , further comprising the step of generating a graphical representation of the social network of physicians and health care providers.
5. A system for health insurance fraud detection comprising:
a plurality of disparate, heterogeneous data sources;
a social network analysis unit which receives input from said plurality of disparate, heterogeneous data sources and identifies relationship data between physicians and health care providers;
a social network optimization unit which receives input from said social network analysis unit and said plurality of disparate heterogeneous data sources and constructs a social network of physicians and health care providers;
data extracting means for extracting data pertaining to referrals between physicians and health care providers from a claim database; and
data analysis means for analyzing the extracted data pertaining to referrals using the social network to determine scenarios for investigation.
6. The system for health insurance fraud detection recited in claim 5 wherein said data sources include automated collection and user-generated data sources for social network construction.
7. The system for health insurance fraud detection recited in claim 5 , wherein the constructed a social network of physicians and health care providers identifies physicians and health care providers as nodes with linkages in a social network, wherein the linkages are deterministic and probabilistic attributes.
8. The system for health insurance fraud detection recited in claim 7 , further comprising means for generating a graphical representation of the social network of physicians and health care providers, which graphical representation also depicts referral patterns.
9. A computer readable medium having code which implements a method for health insurance fraud detection, the method comprising the steps of:
constructing a social network database of physicians and health care providers from multiple, disparate and heterogeneous data sources;
extracting data pertaining to referrals between physicians and health care providers from a claim database; and
analyzing extracted data pertaining to referrals using data from the social network database to detect patterns that help determine scenarios for investigation.
10. The computer readable medium having code which implements a method for health insurance fraud detection recited in claim 9 , wherein the step of constructing a social network of physicians and health care providers uses data mining techniques to find relationship data between physicians and health care providers.
11. The computer readable medium having code which implements a method for health insurance fraud detection recited in claim 9 , wherein the step of constructing a social network of physicians and health care providers identifies physicians and health care providers as nodes with linkages in a social network, wherein the linkages are deterministic and probabilistic attributes.
12. The computer readable medium having code which implements a method for health insurance fraud detection recited in claim 11 , further comprising the step of generating a graphical representation of the social network of physicians and health care providers.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/622,740 US20080172257A1 (en) | 2007-01-12 | 2007-01-12 | Health Insurance Fraud Detection Using Social Network Analytics |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/622,740 US20080172257A1 (en) | 2007-01-12 | 2007-01-12 | Health Insurance Fraud Detection Using Social Network Analytics |
Publications (1)
Publication Number | Publication Date |
---|---|
US20080172257A1 true US20080172257A1 (en) | 2008-07-17 |
Family
ID=39618451
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/622,740 Abandoned US20080172257A1 (en) | 2007-01-12 | 2007-01-12 | Health Insurance Fraud Detection Using Social Network Analytics |
Country Status (1)
Country | Link |
---|---|
US (1) | US20080172257A1 (en) |
Cited By (36)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110078252A1 (en) * | 2009-09-29 | 2011-03-31 | Macwan Sanjay | Method and apparatus for creating a social network map of non-voice communications |
US20110106556A1 (en) * | 2009-07-10 | 2011-05-05 | Medimpact Healthcare Systems, Inc. | Modifying a Patient Adherence Score |
WO2012037441A1 (en) * | 2010-09-16 | 2012-03-22 | Thomson Reuters (Scientific) Llc | System and method for detecting and identifying patterns in insurance claims |
US20120179002A1 (en) * | 2011-01-10 | 2012-07-12 | Medimpact Healthcare Systems, Inc. | Aggregating Patient Adherence Scores |
US20120209674A1 (en) * | 2011-02-10 | 2012-08-16 | Microsoft Corporation | Social marketing incentives and rewards |
US20130085769A1 (en) * | 2010-03-31 | 2013-04-04 | Risk Management Solutions Llc | Characterizing healthcare provider, claim, beneficiary and healthcare merchant normal behavior using non-parametric statistical outlier detection scoring techniques |
US8660946B2 (en) * | 2009-09-30 | 2014-02-25 | Zynga Inc. | Apparatuses, methods and systems for a trackable virtual currencies platform |
US8712801B1 (en) * | 2007-07-24 | 2014-04-29 | United Services Automobile Association (Usaa) | Systems and methods for automated institutional processing of payments |
US20140297393A1 (en) * | 2013-03-29 | 2014-10-02 | Doseesay Llc | Activity based incentives |
US20140303993A1 (en) * | 2013-04-08 | 2014-10-09 | Unisys Corporation | Systems and methods for identifying fraud in transactions committed by a cohort of fraudsters |
EP2980748A1 (en) * | 2014-07-31 | 2016-02-03 | Palantir Technologies, Inc. | Querying medical claims data |
US20160117778A1 (en) * | 2014-10-23 | 2016-04-28 | Insurance Services Office, Inc. | Systems and Methods for Computerized Fraud Detection Using Machine Learning and Network Analysis |
US9501202B2 (en) | 2013-03-15 | 2016-11-22 | Palantir Technologies, Inc. | Computer graphical user interface with genomic workflow |
CN107292424A (en) * | 2017-06-01 | 2017-10-24 | 四川新网银行股份有限公司 | A kind of anti-fraud and credit risk forecast method based on complicated social networks |
US9836794B2 (en) | 2014-04-21 | 2017-12-05 | Hartford Fire Insurance Company | Computer system and method for detecting questionable service providers |
CN108257033A (en) * | 2018-01-12 | 2018-07-06 | 中国平安人寿保险股份有限公司 | A kind of declaration form analysis method, device, terminal device and storage medium |
CN108460689A (en) * | 2018-01-12 | 2018-08-28 | 中国平安人寿保险股份有限公司 | A kind of declaration form analysis method, device, terminal device and storage medium |
US10067543B2 (en) | 2016-11-15 | 2018-09-04 | Freebox | Connection system for computer data back-up unit(s) |
US10176526B2 (en) * | 2015-11-30 | 2019-01-08 | Hartford Fire Insurance Company | Processing system for data elements received via source inputs |
US10297288B2 (en) | 2016-11-15 | 2019-05-21 | Freebox | Support for computer data back-up unit(s) |
CN109903169A (en) * | 2019-01-23 | 2019-06-18 | 平安科技(深圳)有限公司 | Claims Resolution based on figure computing technique is counter to cheat method, apparatus, equipment and storage medium |
US10372879B2 (en) * | 2014-12-31 | 2019-08-06 | Palantir Technologies Inc. | Medical claims lead summary report generation |
CN110490750A (en) * | 2019-07-23 | 2019-11-22 | 平安科技(深圳)有限公司 | Data know method for distinguishing, system, electronic equipment and computer storage medium |
CN110766557A (en) * | 2019-09-16 | 2020-02-07 | 平安科技(深圳)有限公司 | Data anomaly analysis method and system based on graph analysis and computer equipment |
CN110852895A (en) * | 2019-11-13 | 2020-02-28 | 易联众信息技术股份有限公司 | Medical security cheat-insurance behavior discovery method based on knowledge graph |
US10628834B1 (en) | 2015-06-16 | 2020-04-21 | Palantir Technologies Inc. | Fraud lead detection system for efficiently processing database-stored data and automatically generating natural language explanatory information of system results for display in interactive user interfaces |
US10628002B1 (en) | 2017-07-10 | 2020-04-21 | Palantir Technologies Inc. | Integrated data authentication system with an interactive user interface |
US10636097B2 (en) | 2015-07-21 | 2020-04-28 | Palantir Technologies Inc. | Systems and models for data analytics |
US10692153B2 (en) | 2018-07-06 | 2020-06-23 | Optum Services (Ireland) Limited | Machine-learning concepts for detecting and visualizing healthcare fraud risk |
US10853454B2 (en) | 2014-03-21 | 2020-12-01 | Palantir Technologies Inc. | Provider portal |
US11210349B1 (en) | 2018-08-02 | 2021-12-28 | Palantir Technologies Inc. | Multi-database document search system architecture |
US11302426B1 (en) | 2015-01-02 | 2022-04-12 | Palantir Technologies Inc. | Unified data interface and system |
CN114529747A (en) * | 2022-03-09 | 2022-05-24 | 平安科技(深圳)有限公司 | Policy detection method, policy detection device, electronic apparatus, and storage medium |
US11373752B2 (en) | 2016-12-22 | 2022-06-28 | Palantir Technologies Inc. | Detection of misuse of a benefit system |
US20220351301A1 (en) * | 2020-01-21 | 2022-11-03 | Optum Services (Ireland) Limited | Methods and systems for behavior signal generation and processing |
US12346913B2 (en) | 2021-03-01 | 2025-07-01 | Unitedhealth Group Incorporated | Method, apparatus and computer program product for predictive graph-based network analysis |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060085370A1 (en) * | 2001-12-14 | 2006-04-20 | Robert Groat | System for identifying data relationships |
US20060190296A1 (en) * | 2004-07-20 | 2006-08-24 | Mydna.Com, Inc. | Method and system for referring healthcare professionals in compliance with various transaction constraints |
US20070005654A1 (en) * | 2005-05-20 | 2007-01-04 | Avichai Schachar | Systems and methods for analyzing relationships between entities |
US20070133768A1 (en) * | 2005-12-12 | 2007-06-14 | Sapphire Mobile Systems, Inc. | Fraud detection for use in payment processing |
-
2007
- 2007-01-12 US US11/622,740 patent/US20080172257A1/en not_active Abandoned
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060085370A1 (en) * | 2001-12-14 | 2006-04-20 | Robert Groat | System for identifying data relationships |
US20060190296A1 (en) * | 2004-07-20 | 2006-08-24 | Mydna.Com, Inc. | Method and system for referring healthcare professionals in compliance with various transaction constraints |
US20070005654A1 (en) * | 2005-05-20 | 2007-01-04 | Avichai Schachar | Systems and methods for analyzing relationships between entities |
US20070133768A1 (en) * | 2005-12-12 | 2007-06-14 | Sapphire Mobile Systems, Inc. | Fraud detection for use in payment processing |
Cited By (47)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8712801B1 (en) * | 2007-07-24 | 2014-04-29 | United Services Automobile Association (Usaa) | Systems and methods for automated institutional processing of payments |
US20110106556A1 (en) * | 2009-07-10 | 2011-05-05 | Medimpact Healthcare Systems, Inc. | Modifying a Patient Adherence Score |
US8909593B2 (en) | 2009-07-10 | 2014-12-09 | Medimpact Healthcare Systems, Inc. | Modifying a patient adherence score |
US8429275B2 (en) * | 2009-09-29 | 2013-04-23 | At&T Intellectual Property I, L.P. | Method and apparatus for creating a social network map of non-voice communications |
US8880630B2 (en) | 2009-09-29 | 2014-11-04 | At&T Intellectual Property I, L.P. | Method and apparatus for creating a social network map of non-voice communications |
US20110078252A1 (en) * | 2009-09-29 | 2011-03-31 | Macwan Sanjay | Method and apparatus for creating a social network map of non-voice communications |
US8660946B2 (en) * | 2009-09-30 | 2014-02-25 | Zynga Inc. | Apparatuses, methods and systems for a trackable virtual currencies platform |
US20130085769A1 (en) * | 2010-03-31 | 2013-04-04 | Risk Management Solutions Llc | Characterizing healthcare provider, claim, beneficiary and healthcare merchant normal behavior using non-parametric statistical outlier detection scoring techniques |
US20120173289A1 (en) * | 2010-09-16 | 2012-07-05 | Thomson Reuters (Sientific) Llc | System and method for detecting and identifying patterns in insurance claims |
WO2012037441A1 (en) * | 2010-09-16 | 2012-03-22 | Thomson Reuters (Scientific) Llc | System and method for detecting and identifying patterns in insurance claims |
US20120179002A1 (en) * | 2011-01-10 | 2012-07-12 | Medimpact Healthcare Systems, Inc. | Aggregating Patient Adherence Scores |
US20120209674A1 (en) * | 2011-02-10 | 2012-08-16 | Microsoft Corporation | Social marketing incentives and rewards |
US9501202B2 (en) | 2013-03-15 | 2016-11-22 | Palantir Technologies, Inc. | Computer graphical user interface with genomic workflow |
US11074993B2 (en) | 2013-03-15 | 2021-07-27 | Palantir Technologies Inc. | Computer graphical user interface with genomic workflow |
US10431327B2 (en) | 2013-03-15 | 2019-10-01 | Palantir Technologies Inc. | Computer graphical user interface with genomic workflow |
US20140297393A1 (en) * | 2013-03-29 | 2014-10-02 | Doseesay Llc | Activity based incentives |
US20140303993A1 (en) * | 2013-04-08 | 2014-10-09 | Unisys Corporation | Systems and methods for identifying fraud in transactions committed by a cohort of fraudsters |
US10853454B2 (en) | 2014-03-21 | 2020-12-01 | Palantir Technologies Inc. | Provider portal |
US10726496B2 (en) | 2014-04-21 | 2020-07-28 | Hartford Fire Insurance Company | Computer system and method for dynamically configurable data interface |
US9836794B2 (en) | 2014-04-21 | 2017-12-05 | Hartford Fire Insurance Company | Computer system and method for detecting questionable service providers |
EP2980748A1 (en) * | 2014-07-31 | 2016-02-03 | Palantir Technologies, Inc. | Querying medical claims data |
US20160117778A1 (en) * | 2014-10-23 | 2016-04-28 | Insurance Services Office, Inc. | Systems and Methods for Computerized Fraud Detection Using Machine Learning and Network Analysis |
US11030581B2 (en) * | 2014-12-31 | 2021-06-08 | Palantir Technologies Inc. | Medical claims lead summary report generation |
US10372879B2 (en) * | 2014-12-31 | 2019-08-06 | Palantir Technologies Inc. | Medical claims lead summary report generation |
US11302426B1 (en) | 2015-01-02 | 2022-04-12 | Palantir Technologies Inc. | Unified data interface and system |
US12056718B2 (en) | 2015-06-16 | 2024-08-06 | Palantir Technologies Inc. | Fraud lead detection system for efficiently processing database-stored data and automatically generating natural language explanatory information of system results for display in interactive user interfaces |
US10628834B1 (en) | 2015-06-16 | 2020-04-21 | Palantir Technologies Inc. | Fraud lead detection system for efficiently processing database-stored data and automatically generating natural language explanatory information of system results for display in interactive user interfaces |
US10636097B2 (en) | 2015-07-21 | 2020-04-28 | Palantir Technologies Inc. | Systems and models for data analytics |
US10176526B2 (en) * | 2015-11-30 | 2019-01-08 | Hartford Fire Insurance Company | Processing system for data elements received via source inputs |
US11049187B2 (en) * | 2015-11-30 | 2021-06-29 | Hartford Fire Insurance Company | Proving ground assisted automated model |
US10297288B2 (en) | 2016-11-15 | 2019-05-21 | Freebox | Support for computer data back-up unit(s) |
US10067543B2 (en) | 2016-11-15 | 2018-09-04 | Freebox | Connection system for computer data back-up unit(s) |
US11373752B2 (en) | 2016-12-22 | 2022-06-28 | Palantir Technologies Inc. | Detection of misuse of a benefit system |
CN107292424A (en) * | 2017-06-01 | 2017-10-24 | 四川新网银行股份有限公司 | A kind of anti-fraud and credit risk forecast method based on complicated social networks |
US10628002B1 (en) | 2017-07-10 | 2020-04-21 | Palantir Technologies Inc. | Integrated data authentication system with an interactive user interface |
CN108257033A (en) * | 2018-01-12 | 2018-07-06 | 中国平安人寿保险股份有限公司 | A kind of declaration form analysis method, device, terminal device and storage medium |
CN108460689A (en) * | 2018-01-12 | 2018-08-28 | 中国平安人寿保险股份有限公司 | A kind of declaration form analysis method, device, terminal device and storage medium |
US10692153B2 (en) | 2018-07-06 | 2020-06-23 | Optum Services (Ireland) Limited | Machine-learning concepts for detecting and visualizing healthcare fraud risk |
US11210349B1 (en) | 2018-08-02 | 2021-12-28 | Palantir Technologies Inc. | Multi-database document search system architecture |
CN109903169A (en) * | 2019-01-23 | 2019-06-18 | 平安科技(深圳)有限公司 | Claims Resolution based on figure computing technique is counter to cheat method, apparatus, equipment and storage medium |
CN110490750A (en) * | 2019-07-23 | 2019-11-22 | 平安科技(深圳)有限公司 | Data know method for distinguishing, system, electronic equipment and computer storage medium |
CN110766557A (en) * | 2019-09-16 | 2020-02-07 | 平安科技(深圳)有限公司 | Data anomaly analysis method and system based on graph analysis and computer equipment |
CN110852895A (en) * | 2019-11-13 | 2020-02-28 | 易联众信息技术股份有限公司 | Medical security cheat-insurance behavior discovery method based on knowledge graph |
US20220351301A1 (en) * | 2020-01-21 | 2022-11-03 | Optum Services (Ireland) Limited | Methods and systems for behavior signal generation and processing |
US11948203B2 (en) * | 2020-01-21 | 2024-04-02 | Optum Services (Ireland) Limited | Methods and systems for behavior signal generation and processing |
US12346913B2 (en) | 2021-03-01 | 2025-07-01 | Unitedhealth Group Incorporated | Method, apparatus and computer program product for predictive graph-based network analysis |
CN114529747A (en) * | 2022-03-09 | 2022-05-24 | 平安科技(深圳)有限公司 | Policy detection method, policy detection device, electronic apparatus, and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20080172257A1 (en) | Health Insurance Fraud Detection Using Social Network Analytics | |
Seethamraju et al. | Intention to use a mobile-based information technology solution for tuberculosis treatment monitoring–applying a UTAUT model | |
US20070255721A1 (en) | System and method for constructing a social network from multiple disparate, heterogeneous data sources | |
Lupu et al. | Trading communities, the networked structure of international relations, and the Kantian peace | |
US7991728B2 (en) | Computer reputation-based message boards and forums | |
Bravata et al. | Challenges in systematic reviews: synthesis of topics related to the delivery, organization, and financing of health care | |
Sweeney et al. | HIV data to care—using public health data to improve HIV care and prevention | |
Utama et al. | Exploration of themes based twitter data in fraud-forensic accounting studies | |
Lynch et al. | Interventions for the uptake of evidence‐based recommendations in acute stroke settings | |
Porter et al. | Identifying fabricated networks within authorship-for-sale enterprises | |
Aguinis | Revisiting some “established facts” in the field of management | |
Constantino et al. | Dual analysis for helping developers to find collaborators based on co‐changed files: An empirical study | |
Guenther et al. | Generalising from qualitative evaluation | |
Chen et al. | Board diversity and post-IPO performance: the case of technology start-ups | |
Park et al. | Finding publics within the blogosphere: the blogger public segmentation model | |
Yuan et al. | The diffusion of a task recommendation system to facilitate contributions to an online community | |
Brown et al. | Future trends in business analytics and optimization | |
Sharma et al. | What went wrong? Identifying Risk factors for popular negative consequences in AI | |
Mujalli et al. | Consequences of COVID-19 on Jordan’s construction sector using data mining techniques | |
Wenn et al. | A sociotechnical investigation of factors affecting IT adoption by rural GPs’ | |
Wu et al. | The impact of individual attributes on knowledge diffusion in web forums | |
Belay et al. | Measuring individual social capital in cooperatives in West Shoa, Ethiopia | |
Xue et al. | IS-driven process reengineering: China's public health emergency response to the SARS crisis | |
Spice et al. | Reviewing self-reported impacts of community health assessment in local health jurisdictions | |
Srigopal | Predicting customer churn risks and optimizing retention investments using reliability and maintenance engineering |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BISKER, JAMES H.;DIETRICH, BRENDA L.;EHRLICH, KATE;AND OTHERS;REEL/FRAME:018753/0604;SIGNING DATES FROM 20061113 TO 20070102 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |